Improving the Security of Your Site by Breaking Into it
暂无分享,去创建一个
[1] Udo W. Pooch,et al. A Unix network protocol security study: network information service , 1992, CCRV.
[2] Robert W. Baldwin. Rule Based Analysis of Computer Security , 1987, COMPCON.
[3] K. Thompson. Reflections on trusting trust , 1984, CACM.
[4] Simson L. Garfinkel,et al. Practical UNIX Security , 1991 .
[5] Steven M. Bellovin,et al. Using the Domain Name System for System Break-ins , 1995, USENIX Security Symposium.
[6] Christoph Ludwig Schuba. Addressing Weaknesses in the Domain Name System Protocol , 1993 .
[7] S. M. Bellovin,et al. Security problems in the TCP/IP protocol suite , 1989, CCRV.